summaryrefslogtreecommitdiff
path: root/src/leap/bitmask/core
AgeCommit message (Collapse)Author
2017-04-03[feat] add a check for the installation of the helpers to the APIRuben Pollan
- Resolves: #8786
2017-03-17[feat] report the real status of the VPNRuben Pollan
2017-03-15[bug] don't check the number of unread mails if incoming service hasn't startedRuben Pollan
2017-03-13[feat] emit MAIL_STATUS_CHANGED eventRuben Pollan
2017-03-13[feat] report the status of keymanager in the mail statusRuben Pollan
2017-03-12[bug] remove offline toggledrebs
The offline toggle added a race condition in which the client could end up offline forever. We decided to remove it for now and then decide if soledad client needs to know about network connectivity (check: https://0xacab.org/leap/soledad/issues/8789).
2017-03-05[feature] pixelated UA integrationKali Kaneko (leap communications)
a bit hacky and all, but this should launch the service and allow interacting from the default site (localhost:9090). this is the first example of a pyqt-js bridge, it's an interesting mechanism that we can use more in the future. no efforts made so far in authenticating the app.
2017-03-03[feat] get VPN params from eip-service.jsonRuben Pollan
Instead of hardcoding them in the code.
2017-03-03[bug] use username instead of provider in the vpn callsRuben Pollan
Without active user we need to use the username instead of the provider in the VPN API. - Resolves: #8783
2017-03-03[feat] mail status will only work for a valid useridRuben Pollan
We used to return the system status if no userid is provided. We don't do it anymore, now is only userid based. - Resolves: #8785
2017-02-27[refactor] access soledad client offline state directlydrebs
2017-02-27[refactor] use new soledad client parameterdrebs
- Resolves: #8721
2017-02-24[feature] require authentication token for apiKali Kaneko (leap communications)
implements a global auth token for the app. this token is written to .config/leap/authtoken, and passed to the anchor part of the landing URI when opening the index resource by the browser. - Resolves: #8765
2017-02-23[refactor] complete eip -> vpn rename in coreKali Kaneko (leap communications)
2017-02-23[refactor] rename eip to vpnKali Kaneko (leap communications)
2017-02-23[feature] add install/uninstall command for helpersKali Kaneko (leap communications)
2017-02-23[feature] new commands: get_certKali Kaneko (leap communications)
2017-02-23[feature] enable vpn serviceKali Kaneko (leap communications)
2017-02-23[feature] initial port of legacy vpn codeKali Kaneko (leap communications)
non functional at the moment, but started doing some cleanup
2017-02-23[feat] eliminate the active user from bonafideRuben Pollan
Active user is now only a concept of the cli. For it we add a ~/.config/leap/bitmaskctl.cfg file. - Resolves: #8769
2017-02-09[feat] add account based keymanagement APIRuben Pollan
- Resolves: #8755
2017-02-09disable authentication for APIKali Kaneko (leap communications)
2017-02-09[feat] Get more detailed status report for emailRuben Pollan
- Resolves: #8754
2016-12-29[docs] fix typo in the header nameKali Kaneko (leap communications)
2016-12-29[bug] avoid unicode conversion bugKali Kaneko (leap communications)
encode to ascii any parameter passed as unicode.
2016-12-29[docs] fix typosKali Kaneko (leap communications)
2016-12-29[bug] fix the logout callKali Kaneko (leap communications)
if user attempts to logout before the incoming multiservice has an entry, there will be a KeyError raised on the MultiService.getServiceNamed() call, which is improperly reported as a confusing error message in the api return call. by catching the KeyError, we make sure that the logout call can terminate properly.
2016-12-29[feature] better param error handling in rest apiKali Kaneko (leap communications)
2016-12-29[feature] pass local auth token after authentication succeedsKali Kaneko (leap communications)
2016-12-29[refactor] reorganize APIKali Kaneko (leap communications)
so that whitelisting doesn't have to peek into the data. added more documentation and some tests stubs too.
2016-12-29[refactor] move web service to its own submoduleKali Kaneko (leap communications)
2016-12-29[feature] local session serviceKali Kaneko (leap communications)
2016-12-29[feature] authentication classes and testsKali Kaneko (leap communications)
2016-12-29[refactor] remove duplication of the bitmask.js libraryKali Kaneko (leap communications)
2016-12-07[bug] always set verbose flag for bundlesKali Kaneko (leap communications)
2016-11-18[refactor] defer_encryption is gone with latest soledadKali Kaneko (leap communications)
2016-11-11[bug] get user parameter in the key commandsKali Kaneko (leap communications)
This has been previously encapsulated in a dict, and the commands were not modified accordingly. I'm adding some very basic test for the KeymanagerService public api contract. - Resolves: #8577
2016-11-09[feature] serve UI as an hidden serviceKali Kaneko (leap communications)
you need to configure onion = True in the services config. for sure, this is gonna be more interesting when we ship pixelated. but for now I thought it can be handy for testing ui changes: no need to bundle, just use your tor browser :) still need to try to serve imap/smtp over the onion service. kudos to meejah for this super-usable library!
2016-11-06[feat] add '-v' optiondrebs
2016-11-06[feat] increase verbosity using command linedrebs
2016-11-06[feat] allow for decreased verbositydrebs
2016-11-06[bug] properly format failure for logging on errbackdrebs
2016-11-04[bug] extend the list of argsKali Kaneko (leap communications)
otherwise, we were appending a list as the last element of the list.
2016-11-03[docs] add a fixme for the scrypt workaroundKali Kaneko (leap communications)
2016-11-03[style] pep8 fixesKali Kaneko (leap communications)
2016-10-21[bug] workaround around scrypt.encrypt() failure in windowsKali Kaneko (leap communications)
scrypt raises a "unable to get salt from /dev/urandom" error when using encrypt method in windows. this is a quick workaround for obfuscating the uuid map, but it needs to be carefully reviewed as per the security implications (i'm using the hostname to salt the key hashing). doing this, I contemplated the possibility that the scrypt encryption we were using could be flawed, since the payloads can be easily guessed. so, take this with a pinch of salt (haha), and let's review it for the future. as always, this was in a rush trying to bring windows support.
2016-10-21[bug] avoid choking with some failuresKali Kaneko (leap communications)
2016-10-21[bug] avoid passing posix-only args to twistd on windowsKali Kaneko (leap communications)
2016-10-21[bug] use tcp endpoint for windowsKali Kaneko (leap communications)
2016-10-21[bug] fail gracefully for non-posix importKali Kaneko (leap communications)